Back

audit

1. To conduct an independent review and examination of system records and activities in order to test the adequacy and effectiveness of data security and data integrity procedures, to ensure compliance with established policy and operational procedures, and to recommend any necessary changes. 2. Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. [INFOSEC-99]3.An independent review and examination of system records and activities in order to test for the adequacy of system security measures, to identify the degree of conformance with established security policy and operational procedures and to recommend any indicated changes in measures, policy and/or procedures [CESG].4. Monitoring to detect and warn of events which might threaten security. Note: The term “security audit” may be used to avoid ambiguity [CESG].5.See Security Audit [7498-2].6.To generate the audit trail, read and interpret its contents, manage its storage, and control its generation [POSIX.6].